Blog

Ransomware Attack Scenario at “Shoes-4-U” – How Would You React?

Ever wondered what it’s like to experience a cyber-attack? Want to know what the warning signs are? This article recreates a typical ransomware attack scenario of what a business may go through in the first 24 hours when experiencing a data breach.

The Scenario

Fictional high street shoe retailer Shoes-4-U, with branches in every town nationwide, has recently received an email from a supplier.

more →

Blog

Zero Trust – Are VPNs A Thing Of The Past?

In a business world that is facing an ever-increasing and intensifying threat landscape, enterprises must re-evaluate their current perimeter security approach. This month we are sharing a blog from one of the pioneers of the “Zero Trust” mentality, Akamai. We take a look at how VPNs are out of date and why we should all be adopting the ‘never trust, always verify’

more →

Blog

9 Ways to Ensure Cloud Security

Stay ahead of the curve when evaluating security solutions for your cloud service

Whether you’ve migrated some or all of your infrastructure to the cloud, or are still thinking about the move, cloud security should be your number one focus. All too often, organizations assume a certain level of protection from a cloud service provider and neglect to ensure cloud-based applications and data are just as safe as those housed in the data centre.

more →